background image

10

| Palo Alto Networks User-ID Services 

 

Amigopod 

|Technical Note 

       

 

Username Suffix

: The Palo Alto Networks plugin versions 0.7.0 and later allow 

you to optionally specify a suffix to add to usernames, e.g., 

#{$user.sponsor_name}

 

4.

 

Click 

Save Configuration

 to save your settings. The configuration of the plugin is 

complete. 

Check Palo Alto Networks Version and Setup 

Palo Alto Networks firewalls and Agent Software are required to be running the following 
software releases in order to support the XML API for the User-ID integration: 

 

Firewall Software Version 3.1.0 or later 

 

User-ID Agent Software Version 3.1.0 or later 

In the test environment referenced in this document, the Palo Alto Networks firewall was 
deployed in a simple 

VWire

 or virtual wire deployment mode as shown below. 

 

In a virtual wire deployment, the firewall is installed transparently on a network segment 
by binding two ports together. You can install the firewall in any network environment 
with no configuration of adjacent network devices required. If necessary, a virtual wire 
can block or allow traffic based on the virtual LAN (VLAN) tag values. By default, the 
virtual wire “default-vwire” binds together Ethernet ports 1 and 2 and allows all untagged 
traffic.  

This configuration will not suit all deployments and it is not a mandatory requirement for 
the integration with Amigopod. The actual design and deployment of the Palo Alto 
Networks firewall is outside of the scope of this document and the reader is encouraged to 
consult the Palo Alto Networks documentation and/or their Palo Alto Networks Networks 
reseller or representative. 

A very simplistic 

Policy

 configuration has been adopted for the test environment that is 

forwarding bi-directional traffic between the 

Trust

 and 

UnTrust

 zones. 

 

Again this configuration will certainly not suit all deployments but Palo Alto Networks 
policy definitions are considered to be out of scope for this document. 
 
 

Summary of Contents for Palo Alto Networks

Page 1: ...Palo Alto Networks User ID Services Unified Visitor Management...

Page 2: ...es The Open Source code used can be found at this site http www arubanetworks com open_source Legal Notice The use of Aruba Networks Inc switching platforms and software by all individuals or corporat...

Page 3: ...figuring the Palo Alto Networks User ID Service 9 Check Palo Alto Networks Version and Setup 10 Configuring User ID Agent Definition 11 Enable Zone Based User Identification 12 Configuring User ID Age...

Page 4: ...t mode and their web based User Interface Document Overview The first section of this document describes how the Amigopod Visitor Management Appliance can be used to provide end user identity visibili...

Page 5: ...ies IT organizations can leverage user and group information for visibility policy creation forensic investigation and reporting on application threat web surfing and data transfer activity User ID he...

Page 6: ...d with the source Enterprise user s identity by integrating with Active Directory or Novell eDirectory for example Typical Wired and Wireless Access Controllers have basic firewalling and traffic mana...

Page 7: ...e Directory integration the User ID Agent is installed on a domain workstation or server and uses a domain account that has access to the Active Directory tree For the Amigopod integration the User ID...

Page 8: ...ins link to download and install updated plugins It is assumed that the configuration steps required to integrate the chosen Wired or Wireless Access Controller have been completed tested and known to...

Page 9: ...cess Controller must be configured correctly to support RADIUS accounting otherwise the Palo Alto Networks firewall will not be updated with the real time user identity information 3 Configure the fol...

Page 10: ...egment by binding two ports together You can install the firewall in any network environment with no configuration of adjacent network devices required If necessary a virtual wire can block or allow t...

Page 11: ...t the Windows host has an IP Address of 10 0 20 53 A port must also be defined for communications between the Palo Alto Networks firewall and the User ID Agent software on the Windows host Ensure to m...

Page 12: ...estion and ensure the Enable User Identification option shown below is checked Once you have edited each relevant Zone in your deployment the summary table should look similar to this with the User Id...

Page 13: ...nt menu option The following start up screen will be displayed Click the Configure option in the left navigation pane to complete the configuration of the Agent software From the Configure screen the...

Page 14: ...returning to main screen by clicking on the User ID Agent option at the top of the left navigation pane a successful connection from the Palo Alto Networks firewall should be displayed as shown below...

Page 15: ...details for a new test account and click the Create Guest button to save the account to the Amigopod database Login to Guest Wireless Network Verify Wireless Connection and IP Addressing The next step...

Page 16: ...ted to a configured landing page or onto your original destination Verify Successful RADIUS Authentication You can now verify the successful RADIUS authentication from the Amigopod interface by going...

Page 17: ...l to the User ID Agent software to inform the Palo Alto Networks of the new IP Address to User mapping Returning to the main screen of the User ID Agent we can see that the Amigopod has successfully s...

Page 18: ...ffic analysis You should now see the From User column successfully populated with the user identity of the test user created in Amigopod One of the most powerful sections of the Palo Alto Networks use...

Page 19: ...d hence initiate at RADIUS stop record being sent from the Access Controller to the Amigopod This will trigger another API update from the Amigopod to the User ID Agent running on the Windows host Ret...

Page 20: ...egrated solution to both the operational and security requirements of providing network access to non Active Directory users In the corporate environment nontechnical operators can easily provision te...

Reviews: